The following is an article that was published in the HUFON Journal, 1992.

Debunking versus Counterintelligence: Reflections of a Pro-ufologist by Richard D. Butler

To the pro-ufologist, debunking and counterintelligence (CI) efforts are seen as the greatest hindrances to legitimate research. The two terms are frequently used as synonyms. In fact, they are two very distinct operations. Debunking has two sources: the U.S. government and civilians. The civilian debunkers are usually professional academics, whose motivation is principally reactionary protection against a challenge to their world view. They see UFOs, and belief in UFOs and even organized study of UFOs as a threat to their own reality system.

The protective strategy is, in psychological terms, the well-known process called “denial.” We see it in alcoholics, and we see it in UFO-bashers. It is also quite an efficient way to handle complex data and hypotheses. Simply deny it, make a joke, and move on and away from the challenge. Ridicule is an almost essential part of the denial process. The debunker strives to convince not only his audience that the subject is nonsense, but he must also convince himself. The self-imposed wall of denial is enforced by ridicule. There is nothing new about the debunking process.

The history of science is, in a sense, the history of debunking. Clearly, every
important advance in science has been met with ridicule. A recent example is
the development of the atomic bomb. Top scientists were skeptical that the bomb
would work. President Roosevelt’s military aide stated that, as an expert in
explosives, he could assure the President that the atomic bomb would never,
and could never, explode! Yet in the early morning hours over the Trinity Site,
a tiny flower of hell blossomed in the desert. The impossible had become awesomely
real. Physicist J. Robert Oppenheimer was heard intoning, “Behold I become
death, a shatterer of worlds.” This was an apt epitaph for the debunkers,
whose psychological world was shattered. Debunking has been with us since the
first debunker laughed at the man who decided to move out of the cave.

See also  Abduction Experience Classification 2

In a particularly difficult field of research like ufology, the debunker must
be accepted as something that simply comes with the territory. We must groan,
but accept the old saying, “If you can”t stand the heat, get out of
the kitchen. “The second category of debunking is our official U.S. government
version. This brings us into the deep waters of counterintelligence. CI is defined
as specific and planned activities conducted to destroy the effectiveness of
aforeign intelligence operation. There are various sub-operations within the
heading of CI. The one of most importance to this discussion is counter-espionage,
which is those activities carried out to neutralize another intelligence gathering
group. Its operational parameters include penetration, deception, and manipulation
of those suspected of conducting espionage activities. And it’s all perfectly
legal: presidential executive orders have made it so. Because these activities
are necessarily covert, not much is known about them by the general public.

CI operations are staffed by highly skilled and dedicated personnel. Their
goal is to deny an enemy information which could be used to destroy our lives,
property, and way of life. But how does the UFO business tie in? National Intelligence
is the key term. This is defined as any intelligence information produced by
the CIA (or other equivalent agency) that bears on the broad aspects of nationalpolicy
and the national security of the United States. This intelligence is then analyzed
to determine if a threat condition exists. If the answer is “yes,”
a Threat Analysis Report is prepared. The report identifies and locates the
threat,and estimates the potential damage levels which the threat could inflict.
The hreat Analysis Report is sent to the National Security Council (NSC) for
review.

See also  Abduction Experience Classification 6

The Council, in turn,advises the President with respect to formulation and
integration of domestic, foreign, and military policies. Once the threat is
confirmed by the NSC, various agencies will be tasked to perform both the intelligence
and counterintelligence functions, as well as accelerated defensive weapons
programs. It is time to look at the UFO intelligence gathering program. Most
ufologists will probably be shocked by the nature and dimensions of this operation.
Every ufologist and UFO organization in the world is an overt intelligence-gathering
asset of the United States. Your job as a ufologist is to monitor all UFO activities,
including sightings, landings and abductions.

This information is published, providing an intelligence channel back into the system. The CIA has the mission of collecting all published civilian UFO intelligence data. An Air Force public information release (still in use) tells us that their investigation of UFOs ended with the deactivation of Project Blue Book. Further, it says that UFO investigations have been turned over to academic institutions and civilian UFO research organizations. In practice, this means that information of genuine scientific value will not be overlooked. In other words, Blue Book never really ended, it just changed hands. And, whether you know it or not, or like it or not, you are part of the intelligence – gathering network, feeding straight to the CIA’s UFO files.

But this particular brand of intelligence data is perfectly open to the public, in the form of UFO books, journals and public meetings. And this presents the government with a unique problem. As a UFO researcher, you are simultaneously gathering data for the government, and trying to break through the wall of secrecy to discover what the government knows. You are spying for them, and spying on them. By spying on your own government and, in fact, doing so in a very aggressive manner, you automatically trigger the counter-intelligence machinery. The task of screwing you up, meaning the official CI operation against ufologists, is assigned to Security and Counterintelligence Special Operations departments within various intelligence agencies. Note the three main mission criteria:

See also  1992: Abduction Experience Classification

Part 6

Leave a Reply